April 2026 (30)
Rack::Static Information Disclosure Vulnerability (CVE-2026-34785)
2 rules 1 TTP 1 CVERack versions prior to 2.2.23, 3.1.21, and 3.2.6 are vulnerable to information disclosure due to improper static file serving via a prefix matching issue in Rack::Static.
Balena Etcher for Windows TOCTOU Vulnerability
2 rules 1 TTP 1 CVEA Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in Balena Etcher for Windows prior to v2.1.4 allows attackers to escalate privileges and execute arbitrary code by replacing a legitimate script with a crafted payload during the flashing process.
Huimeicloud hm_editor Server-Side Request Forgery Vulnerability (CVE-2026-5346)
2 rules 1 TTP 1 CVEA server-side request forgery (SSRF) vulnerability exists in huimeicloud hm_editor up to version 2.2.3, allowing remote attackers to manipulate the 'url' argument in the client.get function of src/mcp-server.js to potentially access internal resources.
Endian Firewall Arbitrary File Deletion via Path Traversal (CVE-2026-34790)
2 rules 1 TTP 1 CVEEndian Firewall versions 3.3.25 and prior allow authenticated users to delete arbitrary files due to a path traversal vulnerability in the `remove ARCHIVE` parameter of the `/cgi-bin/backup.cgi` script, leading to unauthorized file system modification.
Endian Firewall Command Injection Vulnerability (CVE-2026-34791)
2 rules 1 TTP 1 CVEEndian Firewall version 3.3.25 and prior allows authenticated users to execute arbitrary OS commands due to an OS command injection vulnerability in the DATE parameter of the /cgi-bin/logs_proxy.cgi endpoint.
Suricata DCERPC Buffering Inefficiency Vulnerability (CVE-2026-31937)
2 rules 1 TTP 1 CVESuricata versions prior to 7.0.15 are vulnerable to CVE-2026-31937, where inefficient DCERPC buffering can lead to a denial-of-service condition through performance degradation.
Suricata HTTP2 Continuation Frame Flooding Denial of Service (CVE-2026-31935)
2 rules 1 TTP 1 CVEA denial of service vulnerability, CVE-2026-31935, exists in Suricata versions prior to 7.0.15 and 8.0.4, where flooding the system with crafted HTTP2 continuation frames leads to memory exhaustion and process termination.
SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0
2 rules 1 TTP 1 CVEA SQL injection vulnerability exists in itsourcecode Online Enrollment System 1.0 within the Parameter Handler component at /enrollment/index.php, where manipulating the deptid argument can lead to remote code execution, with public exploits available.
DefaultFuction CMS 1.0 Command Injection Vulnerability (CVE-2026-5333)
2 rules 2 TTPs 1 CVEDefaultFuction Content-Management-System 1.0 is vulnerable to command injection via manipulation of the 'host' argument in the /admin/tools.php file, allowing remote attackers to execute arbitrary commands.
Suricata DoS Vulnerability (CVE-2026-31933)
2 rules 1 TTP 1 CVESpecially crafted network traffic can cause Suricata to slow down, leading to a denial-of-service condition in versions prior to 7.0.15 and 8.0.4, as identified by CVE-2026-31933.
Suricata KRB5 Buffering Inefficiency Vulnerability (CVE-2026-31932)
2 rules 1 TTP 1 CVEAn unauthenticated attacker can exploit CVE-2026-31932, a vulnerability in Suricata versions prior to 7.0.15 and 8.0.4, to cause performance degradation due to inefficient KRB5 buffering.
Suricata NULL Dereference Vulnerability
2 rules 2 TTPs 1 CVESuricata versions 8.0.0 to before 8.0.4 are vulnerable to a NULL dereference crash when using the 'tls.alpn' rule keyword, potentially leading to a denial of service.
ShareFile Storage Zones Controller Unauthenticated Configuration Access and Potential RCE (CVE-2026-2699)
2 rules 2 TTPs 2 IOCsAn unauthenticated attacker can access restricted configuration pages in Customer Managed ShareFile Storage Zones Controller (SZC), leading to system configuration changes and potential remote code execution.
ShareFile Storage Zones Controller Unauthenticated Remote Code Execution via File Upload (CVE-2026-2701)
2 rules 1 TTPAuthenticated users can upload malicious files to a ShareFile Storage Zones Controller server and execute them, leading to remote code execution, due to improper neutralization of special elements, code generation, and unrestricted file upload.
OpenSTAManager Time-Based Blind SQL Injection Vulnerability
2 rules 1 TTPOpenSTAManager versions before 2.10.2 are susceptible to time-based blind SQL injection via the 'options[stato]' GET parameter, allowing authenticated attackers to extract sensitive database information.
BRICKSTORM Malware Targeting VMware vSphere Environments
2 rules 2 TTPsThe BRICKSTORM malware targets VMware vSphere environments, specifically vCenter Server Appliance (VCSA) and ESXi hypervisors, by exploiting weak security configurations to establish persistence at the virtualization layer, leading to administrative control and potential data exfiltration.
Unusual City for Azure Activity Logs Event
2 rules 3 TTPsA machine learning job detected Azure Activity Logs activity that, while not inherently suspicious or abnormal, is sourcing from a geolocation (city) that is unusual for the event action, indicating potential compromised credentials.
Spike in Successful Logon Events from a Source IP
2 rules 3 TTPsA machine learning job detected a spike in successful authentication events from a source IP address, which can indicate password spraying, user enumeration, or brute force activity, potentially leading to credential access.
Keycloak Denial-of-Service Vulnerability via Excessive Scope Parameter (CVE-2026-4634)
2 rules 1 TTP 1 CVEAn unauthenticated attacker can cause a denial-of-service on Keycloak servers by sending a crafted POST request to the OIDC token endpoint with an excessively long scope parameter, leading to high resource consumption.
Keycloak UMA Policy Bypass Vulnerability (CVE-2026-4636)
2 rules 3 TTPs 1 CVECVE-2026-4636 describes a vulnerability in Keycloak where an authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation, leading to unauthorized access to victim-owned resources.
Keycloak Authorization Code Forging Vulnerability (CVE-2026-4282)
2 rules 1 TTP 1 CVEAn unauthenticated attacker can exploit CVE-2026-4282 in Keycloak's SingleUseObjectProvider to forge authorization codes, leading to privilege escalation and the creation of admin-capable access tokens.
Keycloak Redirect URI Bypass Vulnerability (CVE-2026-3872)
2 rules 1 TTP 1 CVECVE-2026-3872 is a vulnerability in Keycloak that allows an attacker controlling a path on the same web server to bypass URI redirect validation using a wildcard, potentially leading to access token theft and information disclosure.
DeepLoad Malware Distributed via ClickFix
2 rules 3 TTPsThe DeepLoad malware steals credentials, installs malicious browser extensions, spreads via USB drives, and is being distributed via ClickFix campaigns using PowerShell loaders.
SillyTavern Path Traversal Vulnerability in Chat Endpoints
3 rules 4 TTPsA path traversal vulnerability in SillyTavern versions 1.16.0 and earlier allows an authenticated attacker to read and delete arbitrary files under their user data root by manipulating the avatar_url parameter in the `/api/chats/export` and `/api/chats/delete` endpoints.
SSH Authorized Key File Modification Inside a Container
2 rules 4 TTPsThe rule detects the creation or modification of an authorized_keys file inside a container, a technique used by adversaries to maintain persistence on a victim host by adding their own public key(s) to enable unauthorized SSH access for lateral movement or privilege escalation.
TrueConf Zero-Day Exploitation Leading to Arbitrary Code Execution
2 rules 3 TTPs 1 CVE 4 IOCsHackers exploited a zero-day vulnerability (CVE-2026-3502) in TrueConf conference servers to execute arbitrary files on connected endpoints, potentially deploying the Havoc C2 framework.
Unusual Spike in Bytes Written to External Device Detected by Machine Learning
2 rules 1 TTPA machine learning job has detected a spike in bytes written to an external device, which is anomalous and can signal illicit data copying or transfer activities, potentially leading to data exfiltration.
Unauthenticated SQL Injection Vulnerability in mb24api Endpoint (CVE-2026-33616)
2 rules 1 TTP 1 CVECVE-2026-33616 describes an unauthenticated blind SQL Injection vulnerability affecting an mb24api endpoint, which a remote attacker can exploit by injecting special elements into a SQL SELECT command, potentially leading to a total loss of confidentiality due to improper neutralization of special elements.
Unauthenticated SQL Injection Vulnerability in getinfo Endpoint (CVE-2026-33614)
2 rules 1 TTP 1 CVEAn unauthenticated SQL Injection vulnerability (CVE-2026-33614) in the getinfo endpoint allows a remote attacker to execute arbitrary SQL commands due to improper neutralization of special elements, potentially leading to a total loss of confidentiality.
Unauthenticated SQL Injection Vulnerability in setinfo Endpoint
2 rules 1 TTP 1 CVE 2 IOCsAn unauthenticated remote attacker can exploit a SQL Injection vulnerability (CVE-2026-33615) in the setinfo endpoint by injecting malicious code into a SQL UPDATE command, leading to a total loss of integrity and availability.